{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,4]],"date-time":"2025-06-04T05:26:21Z","timestamp":1749014781577,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":23,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819759361"},{"type":"electronic","value":"9789819759378"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-981-97-5937-8_26","type":"book-chapter","created":{"date-parts":[[2024,8,12]],"date-time":"2024-08-12T08:02:36Z","timestamp":1723449756000},"page":"314-325","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Novel Knowledge Graph-Based Modeling for\u00a0Vulnerability Detection in\u00a0the\u00a0Internet of\u00a0Medical Things"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4046-9578","authenticated-orcid":false,"given":"Kulsoom Saima","family":"Bughio","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2264-8719","authenticated-orcid":false,"given":"David Michael","family":"Cook","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2181-8445","authenticated-orcid":false,"given":"Syed Afaq Ali","family":"Shah","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,8,13]]},"reference":[{"doi-asserted-by":"publisher","unstructured":"Banaeian Far S., Imani Rad A.: Internet of Artificial Intelligence (IoAI): the emergence of an autonomous, generative, and fully human-disconnected community. Discover Appl. Sci. 6,3, 6:91. (2024). https:\/\/doi.org\/10.1007\/s42452-024-05726-3","key":"26_CR1","DOI":"10.1007\/s42452-024-05726-3"},{"key":"26_CR2","doi-asserted-by":"publisher","first-page":"650","DOI":"10.3934\/mbe.2024028","volume":"21","author":"Q Niu","year":"2023","unstructured":"Niu, Q., et al.: Toward the internet of medical things: architecture, trends and challenges. Math. Biosci. Eng. 21, 650\u2013678 (2023)","journal-title":"Math. Biosci. Eng."},{"unstructured":"Doyle P.,: Healthcare breaches on the rise in 2022. Accessed Dec 25 2023. https:\/\/www.techtarget.com\/searchsecurity\/news\/252521771\/Healthcare-breaches-on-the-rise (2023)","key":"26_CR3"},{"unstructured":"Doug B.: Top healthcare data breach statistics of 2023. Persona (2023)","key":"26_CR4"},{"unstructured":"Journal, H.: More Than 4 Million Individuals Affected by Cyberattack on Independent Living Systems. THE HIPAA JOURNAL (2023)","key":"26_CR5"},{"key":"26_CR6","doi-asserted-by":"publisher","first-page":"48948","DOI":"10.1109\/ACCESS.2019.2910087","volume":"7","author":"F Alsubaei","year":"2019","unstructured":"Alsubaei, F., Abuhussein, A., Shiva, S.: Ontology-based security recommendation for the internet of medical things. IEEE Access 7, 48948\u201348960 (2019). https:\/\/doi.org\/10.1109\/ACCESS.2019.2910087","journal-title":"IEEE Access"},{"doi-asserted-by":"publisher","unstructured":"Khan, F., Jan, M. A., Alturki, R., Alshehri, M. D., Shah, S. T., Rehman, A. U.: A secure ensemble learning-based fog-cloud approach for cyberattack detection in IoMT. IEEE Trans. Industr. Inform. 19, 10, 10125\u201310132 (2023). https:\/\/doi.org\/10.1109\/TII.2022.3231424","key":"26_CR7","DOI":"10.1109\/TII.2022.3231424"},{"doi-asserted-by":"publisher","unstructured":"Kulshrestha, P., Kumar TV. Vijay.: Machine learning based intrusion detection system for IoMT. Int. J. Syst. Assur. Eng. Manage. (2023). https:\/\/doi.org\/10.1007\/s13198-023-02119-4","key":"26_CR8","DOI":"10.1007\/s13198-023-02119-4"},{"key":"26_CR9","doi-asserted-by":"publisher","DOI":"10.1007\/s13369-023-07896-5","author":"J Almalki","year":"2023","unstructured":"Almalki, J.: State-of-the-art research in blockchain of things for healthcare. Arab. J. Sci. Eng. (2023). https:\/\/doi.org\/10.1007\/s13369-023-07896-5","journal-title":"Arab. J. Sci. Eng."},{"key":"26_CR10","doi-asserted-by":"publisher","first-page":"10769","DOI":"10.1016\/j.compeleceng.2022.107691","volume":"99","author":"SK Jagatheesaperumal","year":"2022","unstructured":"Jagatheesaperumal, S.K., Mishra, P., Moustafa, N., Chauhan, R.: A holistic survey on the use of emerging technologies to provision secure healthcare solutions. Comput. Electr. Eng. 99, 10769 (2022). https:\/\/doi.org\/10.1016\/j.compeleceng.2022.107691","journal-title":"Comput. Electr. Eng."},{"key":"26_CR11","doi-asserted-by":"publisher","first-page":"107725","DOI":"10.1109\/ACCESS.2023.3281655","volume":"11","author":"M Mahmood","year":"2023","unstructured":"Mahmood, M., et al.: Improving security architecture of internet of medical things: a systematic literature review. IEEE Access 11, 107725\u2013107753 (2023). https:\/\/doi.org\/10.1109\/ACCESS.2023.3281655","journal-title":"IEEE Access"},{"doi-asserted-by":"publisher","unstructured":"Sills, M., Ranade, P., Mittal, S.: Cybersecurity threat intelligence augmentation and embedding improvement - a healthcare usecase. In: Proceedings - 2020 IEEE International Conference on Intelligence and Security Informatics, ISI 2020 (2020). https:\/\/doi.org\/10.1109\/ISI49825.2020.9280482","key":"26_CR12","DOI":"10.1109\/ISI49825.2020.9280482"},{"issue":"4","key":"26_CR13","doi-asserted-by":"publisher","first-page":"2271","DOI":"10.1007\/s10586-022-03658-4","volume":"26","author":"A Rahman","year":"2023","unstructured":"Rahman, A., et al.: Federated learning-based AI approaches in smart healthcare: concepts, taxonomies, challenges and open issues. Cluster Comput. 26(4), 2271\u20132311 (2023). https:\/\/doi.org\/10.1007\/s10586-022-03658-4","journal-title":"Cluster Comput."},{"doi-asserted-by":"publisher","unstructured":"Awotunde, J.B., Chakraborty, C., Folorunso, S. O.: A Secured smart healthcare monitoring systems using blockchain technology. Internet of Things, pp. 127\u2013143, (2022). https:\/\/doi.org\/10.1007\/978-3-030-81473-1_6","key":"26_CR14","DOI":"10.1007\/978-3-030-81473-1_6"},{"doi-asserted-by":"publisher","unstructured":"Otoum, Y., Wan, Y., Nayak, A.: Federated transfer learning-based IDS for the Internet of Medical Things (IoMT). In: 2021 IEEE Globecom Workshops, GC Wkshps 2021 Proceedings, pp. 1\u20136 (2021). https:\/\/doi.org\/10.1109\/GCWkshps52748.2021.9682118","key":"26_CR15","DOI":"10.1109\/GCWkshps52748.2021.9682118"},{"key":"26_CR16","doi-asserted-by":"publisher","first-page":"12","DOI":"10.4135\/9781506326139.n302","volume":"1996","author":"BB Frey","year":"2018","unstructured":"Frey, B.B.: Health insurance portability and accountability act. The SAGE Encycl. Educ. Res., Measure., Eval. 1996, 12\u201314 (2018). https:\/\/doi.org\/10.4135\/9781506326139.n302","journal-title":"The SAGE Encycl. Educ. Res., Measure., Eval."},{"unstructured":"Therapeutic Goods Administration: Medical device cyber security guidance for industry, pp. 1\u201355 (2021)","key":"26_CR17"},{"issue":"4","key":"26_CR18","doi-asserted-by":"publisher","first-page":"253","DOI":"10.5455\/aim.2019.27.253-258","volume":"27","author":"S Nasiri","year":"2019","unstructured":"Nasiri, S., Sadoughi, F., Tadayon, M.H., Dehnad, A.: Security requirements of internet of things-based healthcare system: A survey study. Acta Informatica Medica 27(4), 253\u2013258 (2019). https:\/\/doi.org\/10.5455\/aim.2019.27.253-258","journal-title":"Acta Informatica Medica"},{"doi-asserted-by":"publisher","unstructured":"Yaqoob, T., Abbas, H., Atiquzzaman, M.: Security vulnerabilities, attacks, countermeasures, and regulations of networked medical devices-a review. IEEE Commun. Surv. Tutorials, 21, 4, 3723\u20133768 (2019). https:\/\/doi.org\/10.1109\/COMST.2019.2914094","key":"26_CR19","DOI":"10.1109\/COMST.2019.2914094"},{"key":"26_CR20","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-1922-2","author":"S Qin","year":"2019","unstructured":"Qin, S., Chow, K.P.: Automatic analysis and reasoning based on vulnerability knowledge graph. Springer Singapore (2019). https:\/\/doi.org\/10.1007\/978-981-15-1922-2","journal-title":"Springer Singapore"},{"key":"26_CR21","doi-asserted-by":"publisher","first-page":"3471","DOI":"10.1016\/j.procs.2023.10.342","volume":"225","author":"KS Bughio","year":"2023","unstructured":"Bughio, K.S.: Knowledge organization system for partial automation to improve the security posture of IoMT Networks. Proc. Comput. Sci. 225, 3471\u20133478 (2023). https:\/\/doi.org\/10.1016\/j.procs.2023.10.342","journal-title":"Proc. Comput. Sci."},{"doi-asserted-by":"publisher","unstructured":"Christian, R., Dutta, S., Park, Y., Rastogi,N.: An ontology-driven knowledge graph for android malware. In: Proceedings of the ACM Conference on Computer and Communications Security, pp. 2435\u20132437, (2021). https:\/\/doi.org\/10.1145\/3460120.3485353","key":"26_CR22","DOI":"10.1145\/3460120.3485353"},{"key":"26_CR23","doi-asserted-by":"publisher","DOI":"10.1016\/j.bspc.2021.102717","volume":"68","author":"N Sharma","year":"2021","unstructured":"Sharma, N., et al.: A smart ontology-based IoT framework for remote patient monitoring. Biomed. Signal Process. Control 68, 102717 (2021). https:\/\/doi.org\/10.1016\/j.bspc.2021.102717","journal-title":"Biomed. Signal Process. Control"}],"container-title":["Communications in Computer and Information Science","Recent Challenges in Intelligent Information and Database Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-97-5937-8_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,12]],"date-time":"2024-08-12T08:10:01Z","timestamp":1723450201000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-97-5937-8_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9789819759361","9789819759378"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-981-97-5937-8_26","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"13 August 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"The authors declare no conflict of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Disclosure of Interests"}},{"value":"ACIIDS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Asian Conference on Intelligent Information and Database Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Ras Al Khaimah","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Arab Emirates","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 April 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 April 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"aciids2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/aciids.pwr.edu.pl\/2024\/index.php#about","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}